Exploitation Summary
EIP tracks 1 public exploit for CVE-2008-0146. PoCs published by vivek_infosec.
AI-analyzed exploit summary The provided text describes a cross-site scripting (XSS) vulnerability in W3-mSQL due to insufficient input sanitization. It includes a proof-of-concept URL demonstrating the issue but lacks executable exploit code.
Description
Cross-site scripting (XSS) vulnerability in the error page in W3-mSQL allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the top-level URI.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by vivek_infosec · textwebappscgi
https://www.exploit-db.com/exploits/30975
The provided text describes a cross-site scripting (XSS) vulnerability in W3-mSQL due to insufficient input sanitization. It includes a proof-of-concept URL demonstrating the issue but lacks executable exploit code.
Classification
Writeup 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target:
W3-mSQL (version not specified)
No auth needed
Prerequisites:
Access to a vulnerable W3-mSQL installation
MITRE ATT&CK
devstral-2 · analyzed Feb 16, 2026
Full analysis →
References (5)
Core 5
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/28294
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/485736/100/0/threaded
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/3521
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/51235
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/27116
Scores
EPSS
0.0057
EPSS Percentile
69.0%
Details
CWE
CWE-79
Status
published
Products (1)
hughes_technologies/w3-msql
Published
Jan 08, 2008
Tracked Since
Feb 18, 2026